An Ominous Weaponization of Mobile Exploits
Another day, another mobile exploit. Last week we realized the dangers of public WiFi abuse are magnified by inexpensive hacker kits for snooping on our supposedly HTTPS-protected logins. This week, we learn of inexpensive IMSI catchers bringing cell phone… Continue reading
How to Protect Against the Dangers of Public WiFi Abuse
Art Gross blogs on Breach Secure Now: “An article over at medium [by Maurits Martijn] gives excellent insight into the real dangers of open public WiFi. After reading this article you will never use a public WiFi… Continue reading
Identity Management: The Times They Are A-Changing
In a very interesting article on New Tools for Modern Identity, Mark Diodati addresses new challenges with user authentication. He argues that adaptive authentication, and mobile biometric authentication are here to stay. I agree and encourage folks to… Continue reading
Beyond SWGs (Part 2): Cloud Security Platforms
The Mobile Security Gap
Any enterprise tackling web security for mobile devices must… Continue reading
Can the Internet of Things be Secure?
Can the Internet of Things be secure? The impact on privacy and data control with Jamie Clark, Mark O’Neill, Dan Blum and Jonathan Rodriguez. For full… Continue reading